OSED

https://github.com/r0r0x-xx/OSED-Prearrow-up-right

Prior knowledge for OSED | EXP-301 (Guide)

This is a repository of notes and material that I consider necessary in advance to opt for the course and the OSED certification (Windows User Mode Exploit Development)

This guide was born as a result of my interest in obtaining previous knowledge before eventuring the preparation course for the certification exam OSED.

I am currently in the process of preparing for certification (I will update this repository) :D

         ########    #####   ########    #####   ##     ##
         ##     ##  ##   ##  ##     ##  ##   ##   ##   ##
         ##     ## ##     ## ##     ## ##     ##   ## ##
         ########  ##     ## ########  ##     ##    ###
         ##   ##   ##     ## ##   ##   ##     ##   ## ##
         ##    ##   ##   ##  ##    ##   ##   ##   ##   ##
         ##     ##   #####   ##     ##   #####   ##     ##

Contents

Programming languages

For this certification it is very important to have a knowledge base in the following programming languages:

Python 3: https://youtube.com/playlist?list=PLBf0hzazHTGM_dncTqO9l-0zUQYP0nNPUarrow-up-right

Bash: https://www.youtube.com/watch?v=smbeKPDVs2Iarrow-up-right

Assembly Language:

https://youtu.be/HgEGAaYdABAarrow-up-right

https://sensepost.com/blogstatic/2014/01/SensePost_crash_course_in_x86_assembly-.pdfarrow-up-right

http://www.securitytube.net/groups?operation=view&groupId=6arrow-up-right

C: https://youtu.be/KJgsSFOSQv0arrow-up-right

Operating System

Win register: https://docs.microsoft.com/en-us/troubleshoot/windows-server/performance/windows-registry-advanced-usersarrow-up-right

Reverse Engineering

Introduction To Reverse Engineering | Beginners:

https://youtube.com/playlist?list=PLMB3ddm5Yvh3gf_iev78YP5EPzkA3nPdLarrow-up-right

Training By Ricardo Narvaja:

http://ricardonarvaja.info/WEB/EXPLOITING%20Y%20REVERSING%20USANDO%20HERRAMIENTAS%20FREE/INGLES/arrow-up-right

WinDbg and x86 Architecture

x86 Architecture: https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/x86-architecturearrow-up-right

Intermediate Intel x86: https://opensecuritytraining.info/IntermediateX86.htmlarrow-up-right

Exploiting Stack Overflows

Understanding & Exploiting: https://sghosh2402.medium.com/understanding-exploiting-stack-based-buffer-overflows-acf9b8659cbaarrow-up-right

Intro Exploiting 1: https://www.fuzzysecurity.com/tutorials/expDev/1.htmlarrow-up-right

Intro Exploiting 2: https://www.fuzzysecurity.com/tutorials/expDev/2.htmlarrow-up-right

Intro Exploiting 3: http://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/arrow-up-right

Intro Exploiting 3: https://www.corelan.be/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/arrow-up-right

Exploiting SEH Overflows

https://www.fuzzysecurity.com/tutorials/expDev/3.htmlarrow-up-right

https://www.corelan.be/index.php/2009/07/28/seh-based-exploit-writing-tutorial-continued-just-another-example-part-3b/arrow-up-right

https://www.securitysift.com/windows-exploit-development-part-6-seh-exploits/arrow-up-right

http://www.corelan.be/index.php/2009/07/25/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-3-seh/arrow-up-right

Introduction to IDA Pro

https://resources.infosecinstitute.com/topic/basics-of-ida-pro-2/arrow-up-right

Egghunters

http://www.fuzzysecurity.com/tutorials/expDev/4.htmlarrow-up-right

https://www.securitysift.com/windows-exploit-development-part-5-locating-shellcode-egghunting/arrow-up-right

Shellcode

http://www.hick.org/code/skape/papers/win32-shellcode.pdfarrow-up-right

https://www.securitysift.com/windows-exploit-development-part-4-locating-shellcode-jumps/arrow-up-right

http://www.corelan.be/index.php/2010/02/25/exploit-writing-tutorial-part-9-introduction-to-win32-shellcoding/arrow-up-right

http://www.fuzzysecurity.com/tutorials/expDev/6.htmlarrow-up-right

http://sh3llc0d3r.com/windows-reverse-shell-shellcode-i/arrow-up-right

DEP Bypass

https://medium.com/cybersecurityservices/dep-bypass-using-rop-chains-garima-chopra-e8b3361e50cearrow-up-right

https://cwinfosec.org/Intro-ROP-DEP-Bypass/arrow-up-right

ASLR Bypass

http://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/arrow-up-right

https://www.exploit-db.com/docs/english/17914-bypassing-aslrdep.pdfarrow-up-right

https://www.ccn-cert.cni.es/pdf/documentos-publicos/xi-jornadas-stic-ccn-cert/2575-m11-06-rockandropeando/file.htmlarrow-up-right

Overwriting EIP

https://captmeelo.com/exploitdev/osceprep/2018/06/27/vulnserver-trun.htmlarrow-up-right

https://h0mbre.github.io/Boofuzz_to_EIP_Overwrite/#arrow-up-right

https://www.youtube.com/watch?v=IOjl3tU1Ht8arrow-up-right

ROP chains and Rop playloads decoders

https://scholars.unh.edu/cgi/viewcontent.cgi?article=2376&context=thesisarrow-up-right

https://www.crowdstrike.com/blog/analysis-cve-2013-3906-exploit/arrow-up-right

Practices and exercises

Last updated